Skip to content

Sematext Syslog Integration

Sematext centralized monitoring and logging solution supports receiving syslog messages from any application, as long as they comply to either RFC-3164 or RFC-5424 (and RFC-5425 for TLS). The destination host is / (if using Sematext Cloud Europe) and ports we use are:

  • for Syslog over UDP: 514
  • for Syslog over TCP: 514
  • for Syslog over TLS: 10514
  • for RELP: 20514


Authorizing syslog essentially means telling Sematext Platform which Logs Management App to send logs to. We recommend you embed your Logs Management App token in your syslog daemon's config in a CEE-formatted JSON message. Step-by-step instructions for rsyslog, syslog-ng, and a raw example are below.

You can also put the Logs Management App token in the tag or the APP-NAME part of your syslog message. You'll see an example below as well.

Alternatively, authorize your public IPs and then send messages directly. Note that configuring your log shipper to send your Logs Management App token is preferred to authorizing source IPs. You can see specific instructions for rsyslog, syslog-ng and syslogd for how to forward messages in this case.


Here's a quick way to ship messages via TCP syslog with netcat. We add the App token as a field in the message:

echo 'my-host my-process:@cee: {"logsene-app-token": "LOGS_APP_TOKEN_GOES_HERE", "message": "hello world!"}' | nc 514

If you prefer to add the token as a syslog tag:

echo 'my-host LOGS_APP_TOKEN_GOES_HERE:hello world!' | nc 514

To upload each line of file.txt:

cat file.txt | while read -r LINE; do echo "my-host LOGS_APP_TOKEN_GOES_HERE:$LINE"; done | nc 514

Note that the above will ship every line in the file as the message field. It will not parse the lines, for example if you have a timestamp (the @timestamp field will be populated with the time of the upload). Have a look at logs discovery and pipelines for more details on parsing.

Ways to Ship Logs

In production, you're probably going to use a syslog daemon. Details on configuring syslog daemons to send logs over TCP/UDP/RELP are below:

TLS Encryption

In addition to TCP, UDP and RELP, our Logs Management App also supports RFC-5425 compliant Syslog over TLS. See instructions for rsyslog and syslog-ng on how to configure them.


If you use a recent version of rsyslog (6.4.0 or later), you might want to send logs directly to Sematext's Logs Management Elasticsearch API, through the omelasticsearch module. Details on how to do that are on the rsyslog how to page.